30 March 2017 - Vuzion Ireland Love Cloud

Post on 14-Apr-2017

128 views 0 download

Transcript of 30 March 2017 - Vuzion Ireland Love Cloud

Love Cloud30 March 2017

Kieran McDonnell

Country Manager Vuzion Ireland

Digital transformation is the next industrial revolution

Steam, water, mechanical productionequipment

Division of labor, electricity, mass production

Electronics,IT, automated production

Blurring the physical and the digitaldivide

1784 1870 1969 2017

Industrial Revolution 4.0

About Vuzion

We can help make your business future proof

• A cloud aggregator

• Built on 20 years of delivering and selling cloud services

• A rich portfolio of cloud services

• A smart ecosystem of partners

Vuzion GTM Model

p

Operational Delivery

•Managed Service•Billing & Support

Capability Development

•Technical •Sales

Pre-Sales Engagement

•Technical review•POCs & Trials

Services & Frameworks

•Backup•Identity•IaaS/PaaS

Bespoke Solutions

•Solution Design•ISV Enablement

• Help resellers build their own solutions based around a set of defined frameworks

• Solutions based on “finished” services that can be resold

• Bespoke solution development support

• Service wraps to deliver operational efficiency

Direction on Microsoft

Julian DyerVuzion

o Cloud and Hosting Summit 2017o Reseller & Vuzion (Partner

Center)o Skype for Business updateo Security as a Serviceo Business Premium Updateo Q&A

Cloud and Hosting Summit 2017 – Bellevue Seattle

| 2017 Microsoft Cloud and Hosting Summit

Cloud Model driving Digital Transformation

Growth of SaaS and IaaS

Vuzion Partner smart ecosystem

Partner Center – Reseller update

Skype for Business – Ireland Update

Title.

Security as a Service – SMB opportunity

Security As A ServiceSECURE CONTENT

PROTECT CONTENT: CREATION, TRANSIT,

CONSUMPTION

SECURE DEVICES

WORKPLACE ISSUED OR BYOD DEVICES

GREAT EMPLOYEE EXPERIENCE

PRODUCTIVITY WITHOUT COMPROMISE

SECURE THE FRONT DOOR

IDENTITY DRIVEN SECURITY

IDENTITY IS THE NEW CONTROL PLANE: Stickiness, Future Growth (On-Prem, SalesForce, DropBox and 2600+ other SaaS, AWS, Azure)

Secure the Front Door

Leaked credentials

Infected devices

Configuration vulnerabilities

Risk-based policiesMFA Challenge Risky Logins

Block attacks

Change bad credentials

Suspicious sign-in activities

MACHINE LEARNING AND RISK PROFILING OPEN THE FRONT DOOR BASED ON RISK

Shadow IT Risk

Assessment

User

MFA

ConditionsLocation (IP range)

Device state

User group

Risk

Block access

Enforce MFA per user/per app

Allow access

Leaked credentialsInfected devices Configuration vulnerabilities

RISK BASED POLICIES

MFA Challenge Risky Logins

Block attacks

Change bad credentials

Machine-Learning Engine

Brute force attacks Suspicious sign-in activities

EXTENSIBILITYPOWER BI,SIEMREPORTING APIsNOTIFICATIONSDATA EXTRACTS

Security As A Service – Enabling SKU’s

ENABLING TECHNOLOGIES

UP-SELL/CROSS-SELL

Azure Active Directory Premium P2Azure Active Directory Premium P1 (included in P2)Cloud App Security

No Pre-requisites.Best Position with:1. Business Premium,2. E3 3. E5 4. Azure Deals

SECURE THE FRONT DOOR

IDENTITY DRIVEN SECURITY

ENABLING TECHNOLOGIES

UP-SELL/CROSS-SELL

Azure Active Directory Premium P1Cloud App SecurityAzure Information Protection P2Microsoft Intune

Pre-requisites: Office Mobile AppsBest Position with:1. Business Premium,2. E3 3. E5

SECURE CONTENT

PROTECT CONTENT: CREATION, TRANSIT, CONSUMPTION

Azure Active Directory Premium P1Microsoft Intune

No Perquisites.Best Position with:1. Business Premium,2. E3 3. E5

SECURE DEVICES

WORKPLACE ISSUED OR BYOD DEVICES

ENABLING TECHNOLOGIES

UP-SELL/CROSS-SELL

Azure Active Directory Premium P1

No Perquisites, up-sell with any Office 365 offer

ENABLING TECHNOLOGIES

UP-SELL/CROSS-SELL

GREAT EMPLOYEE EXPERIENCE

PRODUCTIVITY WITHOUT COMPROMISE

Microsoft Update

Jonathan EustaceMicrosoft

15new

releases

359updates

(this past year)

Packaged IPAverage Revenue: $1-$15 per user/per month4

Margin: 65%

• SharePoint-Based Vertical Workflows• Middleware for Hybrid

Synchronization• Industry-specific Workflows• Function-specific Workflows (e.g. HR,

Procurement)• Automated O365 Telemetry

(Availability & Performance) • Office Connectivity & Other Plug-Ins &

Add-ons• External Portals for End Customer

Information• Pre-Configured Dashboards

Project ServicesAverage Revenue: $2.5K-$15K4

Margin: 35%

• Cloud Readiness Assessment• Solution Analysis, Scope, & Design• Office 365 Set up and Remediation• Simple File Server Migration• Workflow Creation in SharePoint• Yammer Adoption• End User Training

Managed ServicesAverage Revenue: $5-$15+ per user/per month4

Margin: 45%

• Office 365 Tenant Management• Reactive Help Desk Support (Office, Skype for

Business, Intune, CRM Online) and interface to MSFT.

• Performance and Application Troubleshooting• Desktop & Device Management & Support• Reports & View Adjustments• Software Asset Management (licensing

management & optimization)• Security Management & Identity Protection• Office Client Connectivity Setup • Mobile Device Connectivity & Management• Web defense (restricting URLs, phishing

malware, spam)• Hybrid Environment Support (Basic

Infrastructure)• VoIP Maintenance• Regulatory Compliance via Office 365

Infrastructure

Exchange Online Skype for Business OneDrive for Business SharePoint Online Yammer

Build long-term, value-added services for Office 365

Based on an average 25 seat deal

Part

ner R

even

ue

Pitch incremental project services to light up each Office 365 workload post deployment

Add managed services to your Office 365 practice and become your customer’s outsourced IT department

Create SharePoint templates and extension apps, package as repeatable IP and monetize

Capitalize on themarket opportunity

Insights to maximize profitability

Managed services opportunity by 2018: $256B1

2018 projected worldwide Public IT cloud services revenue: $127B2

Run-rate Fastest Growing Business: $2.5B3

1. Markets and Markets : Managed Services Market worth $256.05 Billion by 2018(c) 2014 M2 COMMUNICATIONS IDC Worldwide and Regional Public IT Cloud Services 2014–2018 Forecast Oct 2014 | Doc #251730 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015

Creating Differentiation

Concurrency, 2017 http://www.concurrency.com/landing/azure-periodic-table

Project ServicesAverage Revenue: $2.5-$10K4

Margin: 35%

• Cloud Planning and Readiness Assessment

• Solution Analysis, Scope, & Design• Backup Deployment• Deployment Services • Heath Checks • Proof of Concept

Packaged IPAverage Revenue: $2.5-$7.5K4

Margin: 65%

• Automated Monitoring, Alerting, & Logging

• Middleware for Hybrid Synchronization

• Automated Backups & Disaster Recovery

• Automated Disaster Recovery Testing• Office Connectivity & Other Plug-Ins &

Add-ons• External Portals for End Customer

Information• Pre-Configured Dashboards

Managed ServicesAverage Revenue: $2.5-$10K4

Margin: 45%

• Critical Response Support• Azure Consumption Monitoring &

Optimization• Performance Monitoring & Reporting• Troubleshooting

Part

ner R

even

ue

Microsoft Azure Azure Backup Azure Recovery

Build long-term, value-added services for Backup

64% of organizations are currently purchasing backup and restoration services from partners1

$30 billion worth of smartphones are lost in the US in a year2

Nearly a third of all data stored in the cloud is made up of backup and recovery files3

Capitalize on themarket opportunity

Insights to maximize profitability

Concentrate on niches to better differentiate yourself and value-price

Look to move additional workloads to Azure over time

Build out automated tools and own IP to lessen reliance on project services and boost margins

Source: 1. BCSG, 2015 The Small business revolution: Trends in SMB Cloud Adoption enquiries@bcsg.com 2. Lookout Security, March 2012, “Lookout Predicts Americans Lose $30Billion in Smartphones a Year” permissions@readwrite.com 3. Intronis Cloud backup + Recovery , 2013 “2013 State of Cloud Backup MSPs Mission the Mark” 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015

Backupas a

Service

Creating Differentiation

On-Premises Datacenter

Automated Backup Solution

Provides customers with regular reporting on successful completion of backups

Fixed monthly fee

Includes four restores per annum

Four core pillars of the modern partner

Being Ready for GDPR

Darren RobertsVuzion

SHAREPOINT METADATA & TAXONOMIES AUTOMATED

Successful SharePoint projects are built on metadata

• SharePoint is a powerful document management system, but in order to get the return on your investment you need rich metadata added to your documents.

• Without metadata, users will struggle to find and organise their content and organisations will be unable to govern the ever-growing store of information within SharePoint.

• Whether you are migrating content into SharePoint, or looking to improve your existing sites then metadata is the difference between a successful or failed project.

Building taxonomies & adding metadata has always been a tough job

• Building taxonomies from scratch is a time-consuming trial and error prone process.

• Asking users to fill in metadata fields to save their documents to SharePoint impacts productivity and creates user adoption problems.

• Migrated content will have no metadata.

Next-generation taxonomy creation and metadata tagging TermSet uses Natural Language Processing and Machine Learning to add accurate consistent metadata to SharePoint content, without placing any burden on end users or the IT team. No manual work, it just happens.

Taxonomy CreationCreates and maintains SharePoint taxonomiesunique to your contentPowerful natural language processing ensuresyour taxonomies are accurate and always up to date

Cloud or On PremisesChoose from a software as a service or a local installation

Metadata TaggingSharePoint content is automatically tagged with rich and consistent metadataTagging can be part of a migration process or as new documents are added to a library

Packed with Powerful FeaturesLanguage analysisDocument summary generationPattern and phrase matchingConcept classification

See the following benefits to your SharePoint projectSmarter SharePoint migrationsEnrich your documents with meaningful and consistent metadata as part of your migration project

Improve your Information ArchitectureBuild your SharePoint sites to reflect the information you store and remove the need for folders and views

Supercharge SharePoint SearchDramatically improve SharePoint search by providing refinable metadata to your users

Power Compliance & WorkflowsUse metadata to drive compliance and governance of your documents and drive workflows.

Before TermSet

After TermSet

GDPR

What is GDPR?General Data Protection Regulation. A huge change for how we all handle data, PII (Personal Identifiable Information).

What happens if non-compliant?Up to €20M or 4% of global turnover (which ever is greater)

When does GDPR come into force?25th May 2018.

Who does GDPR apply to?Any organisation who hold PII on any other person or organisation

TermSet for GDPR ComplianceAddress: 77 Sixth avenuePhone number: 847-334-2345

Address: 3608 Walnut Creek RoadCity: Chicago

Company: Arnold Associates

Salary: $37,500

Person: Manuel Santiago

TermSet Customers

Protect Data & Recover fromDisaster using Microsoft Azure

Alex McLoughlinUnion Solutions

About Union Managed Services

• 10 Year pedigree transforming the largest IT Infrastructure Environments

• Data Services where your customers need them, how your customers want them.

• Our expertise is Infrastructure, Data Protection and Business Recovery, with a human touch.

• We deliver managed infrastructure on premise, from our UK datacentres or in the Microsoft Azure public.

• Our sole focus is delivering business outcomes for customers in the 100 - 1,000 seat SME marketplace.

Union Solutions Limited 2017

ManageInfrastructure

Protect Data Survive a Disaster

Our Customers

Union Solutions Limited 2017

Protect Data

Union Solutions Limited 2017

What challenges do your customers face…?

• Ransomware, user error, system failure, datacentre loss, malicious intent or degenerative IT bugs .

• Protection windows are shrinking, data is doubling, and many fail to protect data in appropriate to need.

• Trying to compete in a global economy with tech savvy consumers that expect a 24×7 always-on service

• If they lost a significant amount of data, the business would struggle to operate

• Legacy backup software is a huge problem. Proprietary software that locks data in a proprietary format.

Protect Data

Union Solutions Limited 2017

Protect Data

Union Solutions Limited 2017

VisibleMonitored 24×7x365. Daily Exception reporting showing compromised services and regular service reports delivered in a language you and the business can understand.

Specialist ExpertiseData protection has been our area of expertise for more than 20 years. Designed and built some of the most sophisticated solutions for some of the most demanding corporate environments.

Union – Data Protection as a Service

Secure and PortableProtected data is encrypted in transit and at rest. It never leaves your network. Historical copies needed for compliance demands provided to you in native format. No lock-in to proprietary software

Pay as You GrowYou pay on a consumed capacity basis. It’s an OPEX model based on per protected GB of data, with cloud enabled scale and economies.

HybridAn appliance deployed on premise, storing 31 days of backups for Instant data restore. We replicate a copy of your data between sites every night

Survive a Disaster

Union Solutions Limited 2017

What challenges are you facing…?

• A disaster can put your customer out of business.

• They need (it’s demanded) to provide evidence of continuity plans for customers of your customers and regulated industry inspectors.

• Unfortunately, most SME organisations are still playing catch up.

• Disaster Recovery is often at the back of the budget queue:

• Cost of delivering is substantial.

• Chews up cash and profitability.

• They’ve never had a disaster (yet…)

Survive a Disaster

Union Solutions Limited 2017

Survive a Disaster

Union Solutions Limited 2017

Survive a Disaster

Union Solutions Limited 2017

Cloud AutomatedRecover all IT services inside 60 minutes.Instant fail-over of any VM or Physical server to the Microsoft Azure cloud.We operate your infrastructure services all the time they’re running in Azure

Bespoke We create a Dynamic DR Runbook (invocation plan which we automated against) for each customer. Your customers are then armed with a demonstrable plan for customers, auditors, and regulators.

Union – Disaster Recovery as a Service

TestedFull test invocation every year, issuing a certificate to publish to third parties. Union manage the entire fail-over and fail-back processes.Clever technology in Azure enables us to test any server or application for DR, at anytime

ResponsiveYou pay on a consumed capacity basis. It’s an OPEX model with cloud enabled scale and economies.RPO of 60 Minutes, RTO of 60 Minutes at an SME price point (charged per protected VM + storage)

Summary

Union Solutions Limited 2017

Talk to Union and Vuzion

• Create recurring margin by selling cloud enabled managed services

• Both Products orderable through Vuzion (launching on the portal in weeks to come)

• This is a big conversation to have with customers. Multi year contracts drive significant committed income for your organisations.

• Deal registration process locks a qualified opportunity to a Vuzion partner

• Union has marketing support and expert gun slingers ready to support your sales effort to win business

Sign Documents Anytime, Anywhere, on any Device

Elaine PakesDocuSign

Drive usage and adoption to all Microsoft applications: SharePoint, Dynamics CRM, O365, MS Word, Outlook, Windows, Azure

Sign anytime, anywhere, on any device

Get approvals done, faster than ever

DocuSign

Ensure secure and compliant business processes

Fastest & most secure way to make every decision and approval digital

DOCUSIGN CONFIDENTIAL

DisconnectedSystems

ManualProcesses

Poor CustomerExperience

Consumers

Customers

Partners

Suppliers

Employees

DisconnectedSystems

ManualProcesses

Poor CustomerExperience

Consumers

Customers

Partners

Suppliers

Employees

DocuSign Digitizes Decisions & Approvals

With DocuSign

Manage digital transactions and eSignatures directly from Microsoft applications

Office 365 and SharePoint Dynamics CRM Online Windows 10|Windows Phone

Customers can sign or send agreements for signature from any

object in Dynamics CRM Online

Electronically send documents for signature(s) and manage

the documents you send from any device. Log in with Azure

AD.

1,500 Documented Use Cases and Counting – How does Office 365 fit into these use cases?

Sales Order Processing Account Provisioning Sales Compensation

Agreements Referral Agreements Reseller Agreements Field Sales Agreements New Customer Sign Ups Terms and Conditions

Event Registration Customer Communication

Approvals Mass Mailing / Email Approvals Customer Communication

Approvals Brand Compliance / Audits Event and Vendor Approvals

New Hire Paperwork Candidate NDA On/Off-boarding Checklist Employee Policy Distribution &

Signature Contractor Agreements Non-disclosure PTO Management Payroll Forms

Front Desk Sign-in Work Orders Lease Agreements Move In / Move Out Requests Parking Permits Equipment Rentals Lien Releases Site Passes and Onsite Waivers

Invoice Processing Expense Reporting Capitalization Management Audit Sign Off Policy Management Inventory Signoff Asset Transfer / Retirement Hiring Freeze Exemption M&A Documentation

Account Changes Service / Work Orders Term Changes Self Service Requests Compliance Field Service Cancellation Requests Internal Cancellation Processing

Asset Tracking Change Requests Requirements Sign Off Access Management Incident Reporting Production Change

Authorization Maintenance Authorization Order Fulfillment

Change Management Release Management Code Review Reporting Requirements Acceptance Release Scope Commitments Project Charter Templates

NDAs Contract Management Internal Compliance IP Licensing Patent Applications Board Minutes Trade Name Assignment Trademark Assignment Finance Agreements

Purchase Orders Statements of Work Master Service Agreement RFP Sign Off Supplier Compliance Competitive Procurement

Summaries Sole-Source Justifications Procurement Card Applications

Why Should

You Care?

Increase deal size for TAV. 15%

margin from MSRP

Easy to set-up, Simple to use, No implementation

needed

Increase initial deal size.

Land & expand within LoB

Average sales cycle; deals

between 5 - 50 seats < 45 days

Average Deals Closed Per Q; 63

SMB

Increase adoption usage

& penetration of MSFT

Applications

DOCUSIGN CONFIDENTIAL

Develop adoption with end customers on cloud based solutions

Increase the value attached to O365 with our additional services and differentiation

Stronger foot print with customers providing the ability to tackle many LOB/expansion use cases

Increase revenue through sales and ROI for customers

DocuSign Value Drivers to Resellers

Leverage MSFT Integrations

Existing O365 Customers

Net New Customers

Special MSFT O365 Bundle

Land & Expand

Where To Execute

Is DocuSign Legal?

DOCUSIGN CONFIDENTIAL

https://www.docusign.co.uk/how-it-works/legality/global

DOCUSIGN CONFIDENTIAL

DocuSign is the only provider with bank-grade security

Broadest Set of Security Certifications

PCI DSS 3.1Global Security Gold Standard: ISO 27001

Streamlined Process for EU Privacy Law Compliance

SSAE 16 SOC 1 Type IIAT 101 SOC 2 Type II

Data Privacy

https://trust.docusign.com/en-us/

Try it for yourself

DOCUSIGN CONFIDENTIAL

https://secure.docusign.com/demo

Organisations run on email –give it the protection it needs

Nessa LynchehaunMimecast

Session Overview

• Introduction to Mimecast

• Solution overview: understand the platform & problems we solve

• Maximising the opportunity for Partners

• Partner Resources

• Questions

Confidential |

Mimecast at a glanceFounded 2003in London, UK

Cloud services designed to ‘Make Business Email Safer’

Over 25,000 Customers

Growing at 30% YoY

MIMENasdaq Traded

97% Retention Rate

Over 7 million end users

14% Annual Turnover Invested in R&D Over 20 PB or Archive Data

Under Management

Email and three critical business risks

Vulnerability to attackYour users and email infrastructure are under constant attack from a wide range of adversaries.

Total operational dependencyTolerance for email downtime is almost zero as it costs money, damages reputations and cripples business operations.

Highest concentration of corporate dataMassive volumes of your most valuable corporate data are in email. Data loss, leakage or breach will have devastating effects.

Protect against Email Cyber Threat

Prevent Email Outages to Maintain Productivity

Eliminate Data Loss and Maintain Compliance

Reduce Cost and Complexity of Email Infrastructure

We help our customers …

Beyond the mailbox server your business needs…

ArchivingEmail and File StorageCompliancee-Discovery & Legal HoldEnterprise SearchEnd-User AccessStorage Infrastructure

SecurityEmail Gateway (MTA)Anti Virus/Anti SpamAnti MalwareAnti (Spear) PhishingEmail EncryptionData Leak PreventionSecurity Monitoring & ReportingLarge File Transfer

Clustered Mail ServersFailover Data CentersBackup & Recovery Systems

Continuity

Mimecast tackles risks and reducescomplexity

HIGH AVAILABILITY

Email is under attack

› Mimecast › Products › Email Security › Targeted Threat Protection

How Secure Is Your Infrastructure

› Mimecast › Products › Email Security › Targeted Threat Protection

Which Category do you fall under

› Mimecast › Products › Email Security › Targeted Threat Protection

91% Cyber attacks65% Unprepared37% = $1m> loss

Confidential

Top Attack Vector Impacting Global Organizations:

• Phishing• Spear Phishing• Whaling• Social Engineering

› Mimecast › Products › Email Security › Targeted Threat Protection

Ignoring the risk of spear-phishing can spell disaster

Breaches happen

Increase of23%

since 2013

Ave. cost of breach$6.5m

The results can be devastating

Ponemon, 2015

Confidential |

The anatomy of an attack

Three main attack methods:• Malicious URLs in email• Weaponized attachments• Impersonation attacks

40% of emails have an attachment

80% are potentially vulnerable PDF or office docs:

~ 50% open emails and click on links within 1 hour*

Median time to first click: 1m.22s*

233% increase in phishing URLs tracked in 1 year**

* Verizon Data Breach Report 2015 ** Cyren Cyber Threat Yearbook 2015 *** Analysis of 1 Terabyte of Mimecast platform data, 2015

Attack Stats

3% POWERPOINT documents

51% PDF documents

9%EXCELdocuments

17%WORD documents

***

› Mimecast › Products › Email Security › Targeted Threat Protection

Existing anti-spamand anti-virusis not enough

Standard Email Protection

Known threat

Targeted attack

Targeted attack

Spear-phishing Protection

Threat stopped

Security breach

Attack stopped by advanced protection layer

• Traditional email security was never designed to stop targeted attacks

• A specialized second layer of defense is needed to protect data and employees

› Mimecast › Products › Email Security › Targeted Threat Protection

Mimecast Targeted Threat Protection URL Protect

with URL rewriting and dynamic user awareness

Attachment Protectwith file transcription, on-demand and pre-emptive

sandboxing

Impersonation Protectwith dedicated detection of whaling and malware-less

phishing

Internal Email Protectwith file transcription, on-demand and pre-emptive

sandboxing

› Mimecast › Products › Email Security › Targeted Threat Protection

Targeted Threat ProtectionURL Protect

• All URLs in every inbound mail are rewritten at the gateway

• On click, every click real-time scanning of destination site

• Access is granted to clean sites without delay. Access to compromised sites is blocked

• Dynamic user awareness built-in -helps build a human firewall

› Mimecast › Products › Email Security › Targeted Threat Protection

Targeted Threat Protection Attachment Protect• Pre-emptive sandbox checks email

attachments pre-delivery

• Option of innovative transcription with on-demand sandbox

• Potentially harmful attachments replaced with transcribed safe versions

• Employees have instant access to safe files

• Request original via cloud-based sandbox if required

› Mimecast › Products › Email Security › Targeted Threat Protection

Targeted Threat ProtectionImpersonation Protect

Name is One of my Users Names

Domain is like one of my domains

Keyword Dictionary

Reply-to-address mismatch

Newly Observed Domain

Confidential |

Detection and remediation of security threats where the sender and recipient are on the internal network

Plus inspection of outbound emails

Internal Email Protect

Confidential |

Internal Email ProtectDefending against the three types of internal threats

• The Compromised Insider• The Careless Insider• The Malicious Insider

Confidential |

• Compromised Insider– User’s credentials stolen by attacker– Leverages organization’s web-based email to spread attack internally

or externally to partners/customers

• Careless Insider– Sending sensitive data inappropriately via email to colleagues

• Secret projects, Excel sheets with credit cards/SSNs etc…

• Malicious Insider– Purposely distributing malware or malicious URLs– Selling sensitive data to outsiders– Taking sensitive data for personal use

Example Use Cases

Confidential |

• TTP inspection for journaled internal emails

• DLP, URL, & attachment checks

• Unsafe attachment and/or emails removed from inboxes

• Adds URL & attachment checks to outbound email

Key Capabilities

› Mimecast › Products › Email Security › Targeted Threat Protection

Mimecast Targeted Threat Protection URL Protect

with URL rewriting and dynamic user awareness

Attachment Protectwith file transcription, on-demand and pre-emptive

sandboxing

Impersonation Protectwith dedicated detection of whaling and malware-less

phishing

Internal Email Protectwith file transcription, on-demand and pre-emptive

sandboxing

Maximising the opportunity for Vuzion Partners

Confidential

Partner Benefits

•Unified email solution - single platform, single AdCon•Simple licensing model – monthly buy price per user•Happy customers - over 97% customer retention•Exciting roadmap - massive Upsell opportunity•Partner Portal - all the tools you need for on-boarding and managing your customers, training and marketing resources

What does our ideal client look like?

• Any size! SaaS model allows us to scale

• We work well with any sector, but it helps if:

Their business relies on email for communication

There would be a high impact with a data breach or targeted attack

Compliance needs – data jurisdiction, retention period, data protection, tamperproof store

Confidential

Partner Resources

• Mimecast Knowledge Base & Mimecast Central https://www.mimecast.com/customer-success/

• Supporting collateral• https://www.mimecast.com/solutions/platforms/office-365/• Recommendations

• Technical Workshop/Demo• Microsoft MVP Positioning Session

Mail server migration Spam, virus & targeted attack protection

Protecting sensitive & confidential data

Protection against email downtime & data loss

Email storage & eDiscovery

Sending large files

Email access for remote users

Email branding & marketing

Compliance/regulation

Summary

Unlock a lucrative SharePointbusiness, without additionalinvestment

Nick BenhamICS / FLEX

Copyright ICS Solutions 2017

WHAT IS FLEX LITE?

Affordable business critical Microsoft technology for SMEs

Copyright ICS Solutions 2017

Trusted Microsoft Gold Partner for over 20 years

• Established in 1994• Microsoft Tier 1 managed Gold Partner• Founding Partner of the Microsoft Azure Circle• UK’s First Office 365 Partner• UK’s most experienced SharePoint Partner with over 500 Projects

Copyright ICS Solutions 2017

FLEX ENTERPRISE – 70,000 USERS AND £2.7M INVESTED

Established since September 2014

FLEX - BUILT ON EXPERIENCE AND INVESTMENT

“Speedy implementation of SharePoint was our main motivating force for selecting FLEX….” Tony Foot, IT Delivery Manager, WaterAid

“Rapid deployment of SharePoint was our main driving force in selecting FLEX…...” Debbie Jupe, Senior Project Manager, WM Housing

“FLEX has allowed our end users to be much more self-sufficient with regards to content creation….” Adam Doswell, Enterprise Systems Developer, Malvern Instruments

Copyright ICS Solutions 2017

Email

Networking

Email

Networking

Servers

Support

Collaboration

Applications Desktop

Consulting

ServersSupport

Collaboration

Applications Desktop

Consulting

HOW DO I GROW REVENUE IN A CLOUD WORLD?

Pre-cloud revenue landscape for SME partners Post-cloud revenue landscape for SME partners

Support

Consulting

Value Add ISV’s

Value Add ISV’s

Value Add ISV’s

Value Add ISV’s

Value Add ISV’s

FLEX helps partners grow customer revenue in a post cloud world

Copyright ICS Solutions 2017

FLEX MAKES YOU MONEY, OUT-OF-THE-BOX

You don’t need to set up a SharePoint practice

No consulting sale, FLEX is like other ISV software

Compelling customer materials are provided

FLEX is highly affordable reducing costs by up to 90%

Good margins recurring licence and services

FLEX allows partners to quickly generate margin with low investment

Copyright ICS Solutions 2017

SOLUTION IN A BOX MARKETING IN A BOX SELLING IN A BOX DEPLOYMENT IN A BOX

Out-of-the-box software

Best-of-Breed Intranet

Next Generation Collaboration

Digital Workplace

Easy to sell (non consulting)

Software & service pricing tool

Standard demo’s etc..

Standard collateral

Sales support

Easy to market

Pre-built campaigns

Pre-built webinars

Web content

Branded collateral

Easy to deploy

Standard deployment materials

Standard training

3rd Party deployment if needed

HOW DOES THAT WORK?

FLEX provides the partner with everything they need out-of-the-box

Copyright ICS Solutions 2017

WHY DO MY CUSTOMERS NEED FLEX LITE?

Small organisations have the same need to collaborate digitally with

customers, partners and employees as large organisations but a

fraction of the budget.

FLEX uses automation technology and SME business templates to

configure Office 365 and Azure to drive user adoption for a fraction of

the time and cost of doing it manually.

ENTERPRISE

FLEX Lite gives SME’s Enterprise solutions at a realistic cost

SME

Copyright ICS Solutions 2017

WHAT DO I GET OUT-OF-THE-BOX?

Deployment Choice 1Traditional ManualINTRANET - INFORMATION WORKPLACE – SELF SERVICE

75 BUSINESS FORMS

50+ BUSINESS APPS 11 GENERIC

COLLABORATION APPS

Affordable business critical Microsoft technology for SMEs

7 DEPARTMENT HUBS

Copyright ICS Solutions 2017

WHAT CAN I DO WITH IT?

Deployment Choice 1Traditional Manual

Affordable business critical Microsoft technology for SMEs

BUSINESS COMMUNICATIONWhat’s going on in the business? Easily create news, events and articles

SELF-SERVICE COLLABORATIONAbility for end users to effortlessly share and collaborate internally and externally

SIMPLE DOCUMENTATION AND INFORMATION MANAGEMENTAbility to store and find documents easily

Copyright ICS Solutions 2017

HOW DO I USE IT?

Deployment Choice 1Traditional Manual

Deployment Choice 2FLEX Automation

Office 365 Interface Azure Interface

FLEX Business Apps

FLEX AVOIDS THE NEED TO TRAIN ORDINARY USERS IN THE OFFICE 365 OR AZURE TECHNOLOGY

Affordable business critical Microsoft technology for SMEs

Copyright ICS Solutions 2017

FLEX LITE PLAN COMPARISONS

Deployment Choice 1Traditional Manual

Deployment Choice 2FLEX Automation

Affordable business critical Microsoft technology for SMEs

Copyright ICS Solutions 2017

FLEX LITE PLAN COMPARISONS

Deployment Choice 1Traditional Manual

Deployment Choice 2FLEX Automation

Affordable business critical Microsoft technology for SMEs

Copyright ICS Solutions 2017

WHAT DOES IT COST?

DEPLOYMENT COSTS

FLEX Enterprise

Baseline Deployment £37,000

FLEX Lite

Baseline Deployment from £5,995

Affordable business critical Microsoft technology for SMEs

Copyright ICS Solutions 2017

Deployment Choice 1Traditional Manual

FLEX Achieves the following benefits:

EXAMPLES

Affordable business critical Microsoft technology for SMEs

Join the conversation #LoveCloud